This worm also has backdoor capabilities and operates as an IRC bot. It connects to a server with the IP address 65.75.155.30 at port 13001, where it listens for commands from a remote user. It executes commands locally on affected machines, providing remote users virtual control over affected systems.

It acts as a bot that responds to private messages with specific keyword triggers. The following are the corresponding actions it performs: